Blogs | AlienVault
The AlienVault Blogs: Taking On Today’s Threats
Latest

The most recent posts from across the AlienVault blogs.

Subscribe: Via Email | RSS

Labs

Late-breaking discoveries and in-depth analysis.

Subscribe: Via Email | RSS

How-To

Practical, how-to advice, tips and guidance.

Subscribe: Via Email | RSS

Most high profile data breaches we have read about recently include credit card data, healthcare data or other personally identifiable information. Less visible are attacks that target specific political groups or high-profile public officials. Occasionally they make the news (such as last year’s breaches at the State Department and the White House) but more often they are not… Read more

Tags: espionage

If pop culture is to be believed, cybersecurity is hot property. Hacks and breaches not only dominate the real-world media but can be seen everywhere in TV and in the movies. These are popping up as plot devices, like in Homeland, or the focus of shows like CSI Cyber and Mr. Robot. But what do industry professionals think of this?… Read more

Tags: cybersecurity, mr. robot

Password. Just saying "password" will cause most information security professionals heartburn, and users will roll their eyes. Even in the movies, bad passwords are a joke: "So the combination is... one, two, three, four, five? That's the stupidest combination I've ever heard in my life! That's the kind of thing an idiot would have on his luggage!"… Read more

Tags: python, password

An incident response methodology can be explained as a collection of procedures aimed at identifying, investigating and responding to potential security incidents in a way that minimizes impact and supports rapid recovery. In this blog, we'll explain how to use the OODA Loop, developed by US Air Force military strategist John Boyd, to create your own incident response methodology.… Read more

Tags: incident response

This is Part 8 & 9 of a 'How-To' effort to compile a list of tools (free and commercial) that can help IT administrators comply with what was formerly known as the "SANS Top 20 Security Controls". It is now known as the CIS Security Controls. A summary of the previous posts is here: Part 1 - we looked at Inventory of Authorized and… Read more

Tags: data recovery, security training

Get Email Updates

Labs Research
Security Essentials
All Blogs

Gartner MQ

Featured Content

Chat